Alphabet Algorithm scripts

... a fairly faithful implementation of the Porter stemming algorithm that reduces English words to their stems.There is a deviation in the way compound words are stemmed, such as hyphenated words and words starting with certain prefixes. For instance, "international" should be reduced to "internation" and not "intern," but an unmodified ...

... generated from enterprise project data. Main features:High-level encryption algorithms used on passwords to ensure accounts are secure PCS uses the md5 encryption algorithm which has become the de-facto cryptography standard on UNIX and LINUX variants to ensure that passwords are extremely secure and difficult to crack. Provided ...

... though it does so based on a fixed algorithm involving the current date, not the actual number of visitors. The result is a counter that is always increasing, unlike most other JavaScript counters that simply generate a random number to display. Use it to add a fun, inflatable, and most ...

... a simple php encoder that use base64 function algorithm to encode and decode the script.The drawback of this script: - it doesn't have a key for encryption / decryption method. - run slower then normal php script (because it need to re-read the script and decode it). - ...

... on a server. - The specially developed algorithm detects sound-alike as well as look-alike words to produce almost perfect text filtering. - Aquarium is easy to set up and use. - Integrates easily into other PHP and HTML web pages. - Aquarium works with PHP versions ...

... Your internet website. It presents a small complexity of algorithms and small size, which has simply incredibly hastened ... (70-80%) of sending data cap. Simulataneously unique optimized algorithm of my autorship causes that compression on-the-fly doesn't consume so much of server resources as the regular GZIP compression, another PHP accelerators and the ...

A program written to test the strength of md5'd passwords by attempting to brute foce them. This program will attempt to brute force the given md5 hash. The user can also choose the characters to use when brute forcing. ...

... as those created by, for instance, the Earley algorithm, but they do tend to be useful for the parsing of computer file formats and the like (as distinct from natural language and similar "hard" parsing problems). ...

... free software library that implements the rsync remote-delta algorithm. This algorithm allows efficient remote updates of a file, without requiring the old and new versions to both be present at the sending end. The library ...

Nettle is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C , Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space. ...